Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Growing ubiquity and safety relevance of embedded systems strengthen the need to protect their functionality against malicious attacks. Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signatur...
Main Authors: | Benjamin Glas, Oliver Sander, Vitali Stuckert, Klaus D. Müller-Glaser, Jürgen Becker |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2011-01-01
|
Series: | International Journal of Reconfigurable Computing |
Online Access: | http://dx.doi.org/10.1155/2011/836460 |
Similar Items
-
On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process
by: Josyula, Sai Prashanth
Published: (2015) -
Undetectable secret key recovery for the ECDSA digital signature algorithm
by: A. V. Kovalev, et al.
Published: (2010-09-01) -
Kleptographic Attacks on ECDSA
by: Nadezhda Anatolievna Chepick, et al.
Published: (2014-12-01) -
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA
by: Maria-Dolores Cano, et al.
Published: (2020-01-01) -
The Application of ECDSA on Ad-Hoc Networks
by: Yi-Yin Lai, et al.
Published: (2007)